You are here

Cyberattacks

New York Times

Apple said Wednesday that it would open its first data center in China, joining a parade of technology companies responding to growing global demands to build facilities that store online data closer to customers.

New York Times

China analysts say Beijing will hesitate before directly casting blame on North Korea even if evidence directly ties the North to the attack. Beijing is more likely to single out other actors, particularly the United States, experts say.

New York Times

China analysts say Beijing will hesitate before directly casting blame on North Korea even if evidence directly ties the North to the attack. Beijing is more likely to single out other actors, particularly the United States, experts say.

A cybersecurity firm in the United States believes state-sponsored Chinese hackers were trying to infiltrate an organization with connections to a U.S.-built missile system in South Korea that Beijing firmly opposes.

Chinese President Xi Jinping arrives in the United States today on his first state visit. Xi will address a group of American business leadersin Seattle. High on their list of concerns about trade with China is cyber hacking, cyber espionage and...

It has been a difficult few weeks for global technology companies operating in China.Chinese officials strengthened the Internet firewall by blocking the use of virtual private networks (VPNs), reasserted demands that web users register their real...

Christian Science Monitor

Mr. Obama’s punt is not a big surprise as there simply are no good options for responding to North Korea. How do you calibrate a “proportional response” when not countering a military attack but one that targets freedom of expression?

Bloomberg

The dispute between the U.S. and North Korea is escalating after hackers forced Sony to pull a comedy movie about the assassination of North Korean leader Kim Jong Un, exposed Hollywood secrets, and destroyed company data.

Reuters

It was the first time the United States had directly accused another country of a cyber attack of such magnitude on American soil and sets up a possible new confrontation between longtime foes Washington and Pyongyang.

Reports

Research Associate Amy Chang explores the political, economic, and military objectives of China’s cybersecurity apparatus; reveals drivers and intentions of Chinese activity in cyberspace; and analyzes the development of Beijing’s cybersecurity...

Al Jazeera

Unresolved allegations that the U.S. National Security Agency spied&nbsp;on a Chinese telecoms giant Huawei have resurfaced amid growing anger from Chinese officials over accusations that the PLA hacked American databases.

On Monday, the United States Attorney General Eric Holder&nbsp;accused China of hacking American industrial giants&nbsp;such as U.S. Steel and Westinghouse Electric, making unprecedented criminal charges of cyper-espionage against Chinese...

Council on Foreign Relations

The US indicted five Chinese military officers for cyberspying, but the Snowden revelations about alleged NSA activities make it hard to build support for diplomatic efforts from the rest of the world.

New York Times

Until now the administration avoided directly accusing the People’s Liberation Army of using cyberweapons against the United States in a deliberate, government-developed strategy to steal intellectual property and gain strategic advantage.&nbsp;

WSJ: China Real Time Report

The only change,&nbsp;Mandiant’s Chief Security Officer&nbsp;said, has been a noticeable drop in cyber attacks from Unit 61398, a group within the People’s Liberation Army that Mandiant accused in February 2013.&nbsp;&nbsp;

Wall Street Journal

Current and former officials said the offensive shift turned on two developments: new intelligence showing the Chinese military directing cyberspying campaigns, and a sudden change in U.S. companies’ willingness to acknowledge Chinese...

Foreign Policy

On April 13, 2013, when John Kerry pays his first visit to China as the U.S. secretary of state, North Korea will be at the top of his agenda, with Iran’s nuclear program and cyberattacks also extremely important.&nbsp;

Reuters

The new provision following recent cyberattacks requires NASA, as well as the U.S. Justice and Commerce Departments, to seek approval from national law enforcement officials before buying information technology systems from China.&nbsp;

Los Angeles Times

A P.L.A. hacker’s blog is discovered,&nbsp;providing a rare peek into the secretive hacking establishment of the Chinese military, in what is believed to be by far the world’s largest institutionalized hacking operation.&nbsp;

New York Times

&nbsp;As China's economic and defense tactics appear to become more and more successful, David Brooks expects other countries' policies will start to resemble them, whether or not they run counter to our principles.&nbsp;...

Spiegel Online

European Aeronautic Defense and Space Company’s (EADS)&nbsp;firewalls have been exposed to attacks by hackers for years, but now company officials say there was “a more conspicuous” attack a few months ago.&nbsp;&nbsp;

Washington Post

Chinese hackers believe the most pervasive of of all Washington legends: that everything that happens in D.C. fits into somebody’s plan.&nbsp;Because in China, it would be like that. Not in our nation’s capital.&nbsp;

New York Times

The early 2013 cyberattacks and the U.S. government’s response&nbsp;illustrate how different the cyber-cold war between the U.S. and China is from the more familiar superpower conflicts of past decades.&nbsp;&nbsp;

This week, United States government and American media charges of Chinese cyberattacks have led to a variety of responses from netizens across China. On February 19, a CNN camera crew tried to shoot video of the twelve-story military-owned building...

Foreign Policy

&nbsp;Chinese hackers are getting dangerously good at tricking users into clicking on what are known as&nbsp;“phishing emails”&nbsp;-- messages with links or attachments that seem innocuous, but actually dump spyware on recipients'...

Economist

Atlantic

While the story presented fresh evidence of Chinese hacking, the aftermath presents more questions than answers about U.S.-China relations, as well as the connection between U.S. media and Chinese government.

Global Times

The report does not reflect the facts and is not professional, and the PLA has never supported any cyber espionage activities, China's defense ministry said on its official website in response to the accusation...

McClatchy

&nbsp;Obama administration officials acknowledged that China’s involvement in cyber-attacks is a near-constant subject of conversation between the nations’ officials but that there have been few signs that China is willing to stop the attacks.

As The New York Times reported yesterday evening, U.S.-based cybersecurity firm Mandiant has just released a deeply troubling report called “Exposing One of China’s Cyber Espionage Units.” The report alleges wide-spread hacking sponsored by the...

With regular ChinaFile Conversation contributor Elizabeth Economy on the road, we turned to her colleague Adam Segal, Maurice R. Greenberg Senior Fellow for China Studies at the Council on Foreign Relations in New York. Segal said that “the time for...

Associated Press

President Barack Obama signed an executive order aimed at helping protect the computer networks of crucial American industries from cyberattacks and prodded Congress to enact legislation that would go even further.&nbsp;

Wall Street Journal

On a visit to our offices last year, a U.S. lawmaker with knowledge of intelligence affairs explained that, when it comes to cyber-espionage, there are only two kinds of American companies these days: Those that have been hacked, and those that don...